ATTACKS CAN - 翻译成中文

[ə'tæks kæn]
[ə'tæks kæn]
攻击可能会
袭击可以
攻击可
发作可能
发作可
袭击会
袭击可
攻击能够

在 英语 中使用 Attacks can 的示例及其翻译为 中文

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.
欺骗攻击可以持续很长一段时间而不会被发现,并且可能导致严重的安全问题。
Cyber attacks can be devastating to heavy industry, where cyber-physical systems can be compromised.
网络攻击可能对重工业造成毁灭性影响,在重工业中,网络物理系统可能会受到影响。
These attacks can result in the loss of sensitive trade, technological, or other data, and security teams may be at a distinct disadvantage.".
这些攻击可能会造成敏感交易、技术或其它数据的丢失,而安全团队则可能处于明显的劣势。
These attacks can be carried out by various entities and methods from all over the world.
这些攻击可能是世界各地不同实体以不同方法进行的。
Terrorist attacks can shake the foundation of our biggest buildings, but they cannot touch the foundation of America….
恐怖袭击可以动摇我们最高大的建筑,但是他们不可能动摇美国的根基。
Attacks can occur unexpectedly or can be brought on by a trigger, such as a feared object or situation.
攻击可能会意外发生,也可能是由触发器触发的,例如担心的物体或情况。
DDoS attacks can overwhelm their target's web infrastructure and also create congestion within service provider networks that can lead to packet loss.
DDoS攻击可以击垮目标网络的基础设施,并在服务提供商网络内部造成拥塞,从而导致数据包丢失。
It's no secret that distributed denial of service(DDoS) attacks can be devastating to enterprises, taking websites offline and costing companies money and data.
众所周知,分布式拒绝服务(DDoS)攻击可能对企业造成破坏性,使网站脱机并使公司损失资金和数据。
A stock market crash, an unexpected war and terror attacks can lead to a buying frenzy in gold to use as a safe haven.
股市崩盘,意外的战争和恐怖袭击可能导致黄金的购买狂潮,被用作资金避风港。
DDoS attacks can come from lone-wolf actors or nation-states, and several government agencies in Europe have already been victimized by DDoS attacks..
DDoS攻击可能来自孤狼或民族国家,欧洲的一些政府机构已经成为DDoS攻击的牺牲品。
These attacks can impact computers on a massive scale and can persist for months or even years.
这些攻击可能会大规模影响计算机,并可能持续数月甚至数年。
Man-in-the-middle attacks can be used to attack several IoT devices as they share data in real-time.
中间人攻击可用于攻击多个物联网设备,因为它们实时共享数据。
The attacks can be portrayed as conflicts between states, not between peoples.
这些袭击可以被描述为国家之间的冲突,而不是民族之间的冲突。
Session hijacking: Session hijacking attacks can use ARP spoofing to steal session IDs, granting attackers access to private systems and data.
会话劫持:会话劫持攻击可以使用ARP欺骗来窃取会话ID,允许攻击者访问私有系统和数据。
DDoS attacks can represent up to 25 percent of a country's total Internet traffic while they are occurring(Figure 18).
DDoS攻击可能占一个国家互联网流量总量的25%(图18)。
However, DoS attacks can have an even more significant impact in the case of industrial systems.
然而,dos攻击可能会对工业系统带来更大的影响。
DoS attacks can be categorized into three categories- Volumetric attacks, Application-layer attacks, and Protocol attacks..
DoS攻击可分为三类:体量攻击、应用程序层攻击和协议攻击。
Pirate attacks can prevent delivery of humanitarian assistance, raise the costs of traded goods, and endanger ship crews.
海盗袭击可以阻止运送人道主义援助物资,提高货物的交易成本并危及船员的人身安全。
They are more likely to develop asthma and attacks can be more severe, needing hospital care.
他们更容易发展出哮喘,且发作可能更严重,需要医院的护理。
Commenting on the economic impact such attacks can have, Eifert said,"We're talking in the billions, if not trillions of dollars.
在评论此类攻击可能产生的经济影响时,Eifert说,"我们谈论的数十亿甚至数万亿美元。
结果: 151, 时间: 0.0329

单词翻译

顶级字典查询

英语 - 中文